General
-
Target
Multiloader.exe
-
Size
18.7MB
-
Sample
241112-e3g8taxrfl
-
MD5
fbd54e8bf5a7aadb27075022aa967b0d
-
SHA1
eaca19324dd3c85faea7b35d5c71d83d11a14b90
-
SHA256
f9e68a96af0f8b93949c85ff7262a7a0b0fe556242f19288ff5da0da7131e85d
-
SHA512
cfe290e22b6a651f260710d5430eb59cb7a4e4b9e60bc02c42b689e8cab707bccd153c786b87d70a714a1fcab24deb48e55eb31e4bcad249941a00ae33fdc857
-
SSDEEP
393216:xpqPnLFXlryQMDOETgs77fGCg7qsbvExEjwKY2Pqo:+PLFXNyQRE7LIYFK2o
Behavioral task
behavioral1
Sample
Multiloader.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Multiloader.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Multiloader.exe
-
Size
18.7MB
-
MD5
fbd54e8bf5a7aadb27075022aa967b0d
-
SHA1
eaca19324dd3c85faea7b35d5c71d83d11a14b90
-
SHA256
f9e68a96af0f8b93949c85ff7262a7a0b0fe556242f19288ff5da0da7131e85d
-
SHA512
cfe290e22b6a651f260710d5430eb59cb7a4e4b9e60bc02c42b689e8cab707bccd153c786b87d70a714a1fcab24deb48e55eb31e4bcad249941a00ae33fdc857
-
SSDEEP
393216:xpqPnLFXlryQMDOETgs77fGCg7qsbvExEjwKY2Pqo:+PLFXNyQRE7LIYFK2o
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1